时间:2025-05-09 15:33:44 来源:网络整理编辑:綜合
If you perform a very specific query in the search field of online code repository Github, where man
If you perform a very specific query in the search field of online code repository Github, where many Slack bot projects are stored, you can get info that potentially lets you access a trove of corporate data, including companies' internal chats and files.
This is because a lot of Slack bot developers -- and there are a lot of them, since building a Slack bot is quite easy -- included their Slack tokens (personal Slack account credentials) directly in the code, which they share publicly on Github.
SEE ALSO:How do I make Slack apps?The issue was discovered by security company Detectify, which notified Slack about it on March 26. Detectify managed to find "thousands" of such tokens with a simple GitHub search. The story was first reported by Quartz.
Tokens of all types aren't uncommon on GitHub, but the problem is made worse by the way Slack tokens are constructed. In case of private tokens and custom bot tokens, they're a string of characters using these formats:
xoxp-XXXXXXXXX-XXXXXXXXXXXXXXXXXXX
xoxb-XXXXXXXXX-XXXXXXXXX-XXXXXXXXX-XXXXXX
Simply searching for the four letter prefixes on GitHub will net you a lot of tokens in plain text, which we were able to replicate.
If you've never built anything on the Slack platform, you may think this doesn't affect you, and in many cases that's true. But in larger business organizations, it's quite possible that some team member had built a Slack bot and inadvertently revealed their Slack token, potentially exposing company data.
Outsiders can easily gain access to internal chat conversations, shared files, direct messages and even passwords.
"Using the tokens it’s possible to eavesdrop on a company. Outsiders can easily gain access to internal chat conversations, shared files, direct messages and even passwords to other services if these have been shared on Slack," writes Detectify.
The researchers at Detectify have found tokens belonging to Fortune 500 companies, payment providers, Internet service providers health care providers, advertising agencies, university classes and newspapers, among other organizations. And using those tokens, they revealed database credentials, private messages and login details for other services.
The good news is the problem has largely already been fixed. Slack responded to the problem, telling Detectify they've “revoked the tokens you reported, notified affected users and team owners directly, and that we’ll be doing that proactively going forward”.
In other words, if someone makes the same mistake again, Slack will disable the tokens and warn them -- as seen in the message Slack recently started sending to some developers.
Developers, in general, should take care not to place tokens directly in the code and use environment variables instead. Slack admins can make sure only Team Owners and selected Slack members can create tokens and integrations; the option is in Slack's Admin Settings.
Mashablehas contacted Slack about the issue. "Slack is clear and specific that tokens should be treated just like passwords. We warn developers when they generate a token never to share it with other users or applications," a Slack spokesperson said in an email.
According to the spokesperson, Slack will continue to improve its documentation and communications to make sure developers understand this.
"For privacy reasons, we are not sharing information about the teams impacted, however, all of the reported tokens were disabled, as well as others we proactively found. We notified both the users who created the tokens, as well as the owners of affected teams," she wrote.
A popular platform for corporate communication (disclosure: We use Slack at Mashable), Slack boasted more than 2.3 million daily active users in February.
Have something to add to this story? Share it in the comments.
What brands need to know about virtual reality2025-05-09 15:14
巴黎曼聯醞釀今夏驚天交換! C羅向左波切蒂諾向右2025-05-09 15:07
王霜 :我們還需要認清自己 冠軍不能代表所有的東西2025-05-09 15:02
二爺重返諾坎普傳射造三球 衝動踩踏中超舊將染紅2025-05-09 14:55
Over 82,000 evacuate as Blue Cut fire rapidly spreads in southern California2025-05-09 14:50
女足魅力重現溫暖中國足球 王珊珊彰顯玫瑰氣質2025-05-09 14:03
王珊珊 :奪冠象征女足重新起航 想回國吃好吃的2025-05-09 13:51
女足魅力重現溫暖中國足球 王珊珊彰顯玫瑰氣質2025-05-09 13:40
Chinese gymnastics team horrifies crowd with human jump rope2025-05-09 13:35
李佳悅:犧牲小我才能完成大我 熱度退去盼更多人關注女足2025-05-09 13:26
Watch MTV's Video Music Awards 2016 livestream2025-05-09 15:19
女足團隊8日抵達蘇州進行隔離 蘇州方麵已經做好一切準備2025-05-09 15:02
聚勒經紀人:拜仁缺乏尊重 不為賺錢已確定新去向2025-05-09 14:47
人民日報:我們可以永遠相信中國女足 你們值得一切讚美2025-05-09 14:47
J.K. Rowling makes 'Harry Potter' joke about Olympics event2025-05-09 14:23
皇馬利好 !本澤馬複出在即 歐冠戰巴黎鐵定能出場2025-05-09 14:09
張琳豔手持國旗落淚接受采訪 :我們目標就是奪冠2025-05-09 13:38
尤文前瞻:弗拉霍維奇紮卡裏亞首秀 ? 迪巴拉破荒2025-05-09 13:34
Despite IOC ban, Rio crowds get their political messages across2025-05-09 13:26
李磊自評留洋首秀比較理想 感歎異域春節過得有些渾渾噩噩2025-05-09 13:25